Category
All
What’s New in Mender 3.7: Introducing the C++ Client for portability
Mender 3.7 includes all the features published on hosted Mender over the last few months as part of our continuous development and rolling release process.
|
5 min read
How over-the-air (OTA) updates help emergency response teams
Discover how over-the-air (OTA) updates revolutionize emergency response teams, ensuring secure and seamless device maintenance and functionality in critical situations.
|
4 min read
What’s hot in the open source and embedded community?
AI, robotics, IoT, AVs, and more – 2024 is proving to be an exciting year for technology. And the open source and embedded tech community is no exception.
|
5 min read
How to leverage over-the-air (OTA) updates with NVIDIA Microservices for Jetson
Mender, in collaboration with NVIDIA, published two critical use cases, providing a step-by-step guide to over-the-air (OTA) updates with NVIDIA Jetson.
|
3 min read
Transforming business: It’s “All On” for the future of IoT
Insights from CES 2024 Billed as “the most powerful tech event in the world,” CES 2024 brought together more than 135 thousand attendees and four thousand
|
5 min read
Full speed ahead: The software-defined vehicle of the future
Distinguished panelists discuss infotainment and entertainment services for the software-defined vehicle. Automotive OEMs must innovate to move towards a s
|
5 min read
The Future of the Embedded Linux Ecosystem
Insights from the Linux Plumbers Conference 2023 The global Linux market is forecasted to reach $15.64 trillion by 2027, and commands usage among nearly ha
|
5 min read
Software-defined vehicles: an ecosystem approach & OTA strategy
Learn how the automotive industry is shifting towards software-defined vehicles with an ecosystem approach and OTA strategy, embracing open source solutions for innovation and efficiency.
|
5 min read
CVE-2022-45929 & CVE-2022-41324 — Improper access control for low-privileged users
We recently discovered vulnerabilities in Mender Enterprise which relate to access control. Low-privileged read-only users had access to editing settings they were not supposed to edit and see potentially sensitive information which was not necessary.
|
2 min read